(Update:) Fedora: Chronicle of a Server Break-in
In August 2008, the Fedora team noticed irregularities on its server. Project leader Paul W. Frields has now released a detailed report of the break-in.
Paul Frields's Update and Report on Fedora August 2008 Intrusion on the fedora-announce-list reads like a detective novel. It all started on August 12, 2008, when a cron job on a Fedora host reported an error. While reviewing the logs, Fedora admins found a change in the package complement that no one could explain. On short notice, the changes turned out to be tampering by an intruder. The project notified the community of the break-in and promptly pulled the server off the net.
It's now become clear how the rogue entered the server structure: he used no hacker tools, but simply authenticated himself using a copy of an SSH private key that was not passphrase-protected. The key belonged to a Fedora admin and in the log entries it showed that the intruder also cracked or knew the admin's password. How the intruder got to the SSH private key, however, nobody knows.
One of the compromised computers also contained the Fedora package signing key. The intruder created modified versions of the two packages OpenSSH and RPM to get to user passwords and, eventually, the password for the package signing key. Had he been successful, he could have introduced fraudulent packages into the repository. Fortunately the investigation found that
Fedora admins discovered the modified packages before anyone could use the server for package signing.
To mitigate any risk of this ever happening again, the Fedora project quickly rebuilt their entire infrastructure, generated new package signing keys and came up with a new security policy. In a week the most essential systems were back to normal and all admins got new SSH keys. A new repo security policy also required Fedora admin groups to use passphrases on their private keys, a definite break from the past.
Frields assured users that no compromised packages were ever delivered as a result of this break-in, either from the master repository or the mirror sites. He went on to thank the Red Hat security response team for their timely assistance.
Comments
comments powered by DisqusSubscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Canonical Bumps LTS Support to 12 years
If you're worried that your Ubuntu LTS release won't be supported long enough to last, Canonical has a surprise for you in the form of 12 years of security coverage.
-
Fedora 40 Beta Released Soon
With the official release of Fedora 40 coming in April, it's almost time to download the beta and see what's new.
-
New Pentesting Distribution to Compete with Kali Linux
SnoopGod is now available for your testing needs
-
Juno Computers Launches Another Linux Laptop
If you're looking for a powerhouse laptop that runs Ubuntu, the Juno Computers Neptune 17 v6 should be on your radar.
-
ZorinOS 17.1 Released, Includes Improved Windows App Support
If you need or desire to run Windows applications on Linux, there's one distribution intent on making that easier for you and its new release further improves that feature.
-
Linux Market Share Surpasses 4% for the First Time
Look out Windows and macOS, Linux is on the rise and has even topped ChromeOS to become the fourth most widely used OS around the globe.
-
KDE’s Plasma 6 Officially Available
KDE’s Plasma 6.0 "Megarelease" has happened, and it's brimming with new features, polish, and performance.
-
Latest Version of Tails Unleashed
Tails 6.0 is based on Debian 12 and includes GNOME 43.
-
KDE Announces New Slimbook V with Plenty of Power and KDE’s Plasma 6
If you're a fan of KDE Plasma, you'll be thrilled to hear they've announced a new Slimbook with an AMD CPU and the latest version of KDE Plasma desktop.
-
Monthly Sponsorship Includes Early Access to elementary OS 8
If you want to get a glimpse of what's in the pipeline for elementary OS 8, just set up a monthly sponsorship to help fund its continued existence.
Server
Susan
<a href="http://8080proxy.com">http://8080proxy.com</a>
Debian timing?
SELinux is still secure
Re: Corrections
Fedora compromised. Ironic since it is presumably SELINUX protected?
pgmer6809
Corrections.
I still love fedora
The cron may report an error but that hardly matters to my servers
was reading how to Set up RPM Fusion with Fedora to shore up multimedia support
http://www.techunits.com/linux/list/fedora